Patents by Inventor Hristo Iliev
Hristo Iliev has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9602521Abstract: Some examples of security cloud computing environments can be implemented as methods. A processor of a first computer system that lacks permission to store data in a cloud computing environment receives data to be stored in the cloud computing environment. The data is received from a second computer system implementing the cloud computing environment and having permissions to store data in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system provides a notification to the second computer system indicating that the received data is safe for storage in the cloud computing environment, and an identifier that points to the stored data at the computer-readable storage medium.Type: GrantFiled: June 17, 2016Date of Patent: March 21, 2017Assignee: SAP SEInventors: Hristo Iliev, Stoyan Boshev
-
Patent number: 9569328Abstract: Applications and their application components run on a cloud platform and an underlying cloud runtime infrastructure. The cloud platform provides a service that exposes an interface to remotely change log levels of logger objects defined in application components. The application logs are generated and stored for the application components on the cloud runtime infrastructure of the cloud platform. Log levels affect the content stored in the application logs. The exposed interface is instantiated to process remote requests for managing application logs and log levels for a specified application component. The application component is deployed on the cloud platform. The requested change in the log levels is performed based on the implementation of the interface. The change in the log levels is performed in the configuration data on the cloud runtime infrastructure provided by the cloud platform.Type: GrantFiled: November 29, 2012Date of Patent: February 14, 2017Assignee: SAP SEInventors: Vladimir Pavlov, Hristo Kostov, Hristo Iliev, Petar Zhechev, Verzhiniya Noeva
-
Publication number: 20160294850Abstract: Some examples of security cloud computing environments can be implemented as methods. A processor of a first computer system that lacks permission to store data in a cloud computing environment receives data to be stored in the cloud computing environment. The data is received from a second computer system implementing the cloud computing environment and having permissions to store data in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system provides a notification to the second computer system indicating that the received data is safe for storage in the cloud computing environment, and an identifier that points to the stored data at the computer-readable storage medium.Type: ApplicationFiled: June 17, 2016Publication date: October 6, 2016Inventors: Hristo Iliev, Stoyan Boshev
-
Patent number: 9432398Abstract: Some examples of security cloud computing environments can be implemented as methods. A processor of a first computer system that lacks permission to store data in a cloud computing environment receives data to be stored in the cloud computing environment. The data is received from a second computer system implementing the cloud computing environment and having permissions to store data in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system provides a notification to the second computer system indicating that the received data is safe for storage in the cloud computing environment, and an identifier that points to the stored data at the computer-readable storage medium.Type: GrantFiled: June 11, 2014Date of Patent: August 30, 2016Assignee: SAP SEInventors: Hristo Iliev, Stoyan Boshev
-
Publication number: 20150365431Abstract: Some examples of security cloud computing environments can be implemented as methods. A processor of a first computer system that lacks permission to store data in a cloud computing environment receives data to be stored in the cloud computing environment. The data is received from a second computer system implementing the cloud computing environment and having permissions to store data in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system provides a notification to the second computer system indicating that the received data is safe for storage in the cloud computing environment, and an identifier that points to the stored data at the computer-readable storage medium.Type: ApplicationFiled: June 11, 2014Publication date: December 17, 2015Inventors: Hristo Iliev, Stoyan Boshev
-
Publication number: 20150365275Abstract: Various embodiments of systems and methods for cloud environment configuration for cloud application are described herein. In an aspect, the method includes receiving a request for starting a cloud application. In response to the received request, binaries of the cloud application are invoked and the cloud environment configuration for the cloud application is identified. It is determined whether the binaries of the cloud application are to be uploaded independently of its cloud environment configuration. When the binaries are to be uploaded independently of its cloud environment configuration, the binaries and the cloud environment configuration are uploaded separately in different transactions onto cloud. In case the binaries are not to be uploaded independently of its cloud environment configuration, an archive including the binaries and the cloud environment configuration is generated and uploaded onto the cloud.Type: ApplicationFiled: June 12, 2014Publication date: December 17, 2015Inventors: HRISTO ILIEV, INA IVANOVA, MARIA JUROVA
-
Patent number: 9122841Abstract: Applications and their application components are deployed on a cloud platform. The application components generate application logs on the underlying cloud runtime infrastructure of the cloud platform. In one aspect, the application logs may be stored on a network storage on the cloud platform. In another aspect, the application logs may be stored on the cloud runtime infrastructure. The cloud platform provides a service that exposes an interface to remotely provide the stored application logs. The exposed interface is instantiated to process remote requests for application logs for a specified application component. The remote requests are sent from a client. The requested application logs are retrieved based on the implementation of the interface. The application logs are provided to the client.Type: GrantFiled: October 16, 2012Date of Patent: September 1, 2015Assignee: SAP SEInventors: Vladimir Pavlov, Hristo Iliev, Verzhiniya Noeva, Hristo Kostov, Petar Zhechev
-
Publication number: 20150188969Abstract: A client system requests to upload an input data stream to a server system. The input data stream is split to a sequence of chunks. The chunks are transferred in parallel by a number of connections from the client system to the server system. At the server system, the transferred chunks are merged into an output stream according to the sequence. The output stream represents the rebuilt input stream.Type: ApplicationFiled: December 27, 2013Publication date: July 2, 2015Inventors: STOYAN BOSHEV, HRISTO ILIEV, SHENOL YOUSOUF, GEORGI GERGINOV
-
Publication number: 20140109188Abstract: Applications and their application components are deployed on a cloud platform. The application components generate application logs on the underlying cloud runtime infrastructure of the cloud platform. In one aspect, the application logs may be stored on a network storage on the cloud platform. In another aspect, the application logs may be stored on the cloud runtime infrastructure. The cloud platform provides a service that exposes an interface to remotely provide the stored application logs. The exposed interface is instantiated to process remote requests for application logs for a specified application component. The remote requests are sent from a client. The requested application logs are retrieved based on the implementation of the interface. The application logs are provided to the client.Type: ApplicationFiled: October 16, 2012Publication date: April 17, 2014Inventors: VLADIMIR PAVLOV, Hristo Iliev, Verzhiniya Noeva, Hristo Kostov, Petar Zhechev
-
Publication number: 20070156789Abstract: A system and method for file system synchronization is described. A method described includes saving content of a cluster file system (CFS) archive to a CFS database, detecting a change made in the CFS database with respect to the CFS archive, comparing an index of the CFS database with an index of the file system, and updating the file system to reflect the change in the CFS database.Type: ApplicationFiled: December 30, 2005Publication date: July 5, 2007Inventors: Krasimir Semerdzhiev, Hristo Iliev, Nikolai Dimitrov
-
Publication number: 20070156431Abstract: A system and method of starting or stopping components using filters. The filter including an action to be performed on a component, a component type, a vendor name, and a component name.Type: ApplicationFiled: December 30, 2005Publication date: July 5, 2007Inventors: Krasimir Semerdzhiev, Dimitar Kostadinov, Hristo Iliev, Mladen Markov
-
Publication number: 20050268136Abstract: Embodiments include a timeout event management system that registers timeout events and checks for and corrects inaccuracies in timing caused by hibernation or system time changes. The timeout event management system may trigger an event after an intended delay time or at an intended expiration time. A handler program may be called in response to the triggered timeout. In an additional embodiment, the timeout system may track timeout events in a priority queue data structure.Type: ApplicationFiled: May 28, 2004Publication date: December 1, 2005Inventors: Dimitar Kostadinov, Petio Petev, Hristo Iliev, Krasimir Semerdzhiev, Georgi Stanev, Jasen Minov